YANG Ge, LAI Chengzhe, ZHENG Dong. Data Forwarding Solution for Internet of Vehicles with Anonymity and Trust Evaluation[J]. Computer Engineering and Applications, 2022, 58(7): 122-128.
[1] CRUZ S B,ABRUDAN T E,et al.Neighbor-aided loca-lization in vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(10):1-10.
[2] CHENG N,LU N,ZHANG N,et al.Opportunistic WiFi-offloading in vehicular environment:A game-theoryapproach[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(7):1944-1955.
[3] BI Y G,ZHOU H B,XU W C,et al.An efficient PMIPv6 based handoff scheme for urban vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2016,17(12):1-16.
[4] LI L,LIU J,CHENG L,et al.CreditCoin:A privacy-pre-serving blockchain-based incentive announcement network for communications of smart vehicles[J].IEEE Transactions Intelligent Transportation Systems,2018,19:2204-2220.
[5] LU R,LIN X,LIANG X,et al.A dynamic privacy-preserving key management scheme for location-based services in VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2012,13(1):127-139.
[6] 吴黎兵,范静,聂雷,等.一种车联网环境下的城市车辆协同选路方法[J].计算机学报,2017,40(7):1600-1613.
WU L B,FAN J,NIE L,et al.A Collaborative routing method with internet of vehicles for city cars[J].Chinese Journal of Computers,2017,40(7):1600-1613.
[7] 杨志伟,陈昊亮,张波,等.软件定义车联网的数据转发机制[J].计算机应用,2017,37(1):84-89.
YANG Z W,CHENG H L,ZHANG B,et al.Data for-warding mechanism in software-defined vehicu-lar ad hoc network[J].Journal of Computer Applications,2017,37(1):84-89.
[8] 包国华,王生玉,李运发.云计算中基于隐私感知的数据安全保护方法研究[J].信息网络安全,2017(1):84-89.
BAO G H,WANG S Y,LI Y F.Research on data security protection method based on privacy awareness in cloud computing[J].Netinfo Security,2017(1):84-89.
[9] FANG D F,QIAN Y,HU R Q,et al.A flexible and efficient authentication and secure data transmission scheme for IoT applications[J].IEEE Internet of Things Journal,2020,7(4):3474-3484.
[10] POURYAZDAN M,KANTARCI B.Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing[J].IEEE Access,2017,4:529-541.
[11] TARIQ A,REHMAN R A,KIM B,et al.Forwarding strate-gies in NDN-based wireless networks:A survey[J].IEEE Communications Surveys and Tutorials,2020,22(1):68-95.
[12] RAYA M,AZIZ A,HUBAUX J P.Efficient secure aggr-egation in VANETs[C]//Proceedings of International Workshop on Vehicular Ad Hoc Networks,2006.
[13] SAEED M E,LIU Q Y,TIAN G Y,et al.Remote authentication schemes for wireless body area networks based on the internet of things[J].IEEE Internet of Things Journal,2018,5(6):4926-4944.
[14] ZHOU J,ZHOU X W.Anonymous shared certificate entity authentication protocol[J].Wireless Personal Communications,2013,72(4):2761-2772.
[15] DEN BERG E V,ZHANG T,PIETROWICZ S.Blend-in:A privacy-enhancing certificate selection method for vehicular communication[J].IEEE Transactions on Vehi-cular Technology,2009,58(9):5190-5199.
[16] YING B D,MAKRAKIS D,MOUFTAH H T,et al.Dynamic mix-zone for location privacy in vehicular networks[J].IEEE Communications Letters,2013,17(8):1524-1527.
[17] ZHANG C X,LIN X D,LU R X,et al.An efficient message authentication scheme for vehicular communi-cations[J].IEEE Transactions on Vehicular Technology,2008,57(6):3357-3368.
[18] CUI J,XU W Y,ZHONG H,et al.Privacy-preserving authentication using a double pseudonym for internet of vehicles[J].Sensors,2018,18(5):1453.
[19] LAI C Z,LI H,LI X Q,et al.A novel group access authentication and key agreement protocol for machine-
type communication[J].Transactions on Emerging Teleco-mmunications Technologies,2015,26(3):414-431.
[20] KERRACHE C A,CALAFATE C T,CANO J C,et al.Trust management for vehicular networks:An adversary-oriented overview[J].IEEE Access,2016,4:9293-9307.
[21] ZHANG J.A survey on trust management for VANETs[C]//Proceedings of IEEE International Conference on Advance Information Networking & Applications,2011:105-112.
[22] CAO Q H,KHAN I,FARAHBAKHSH R,et al.A trust model for data sharing in smart cities[C]//Proceedings of IEEE International Conference on Communications(ICC),2016:1-7.
[23] ZHANG B,LIU C H,LU J,et al.Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing[J].Computer Networks,2016,101(4):29-41.
[24] LIU A,LI Z X,LIU G F,et al.Privacy-preserving task assignment in spatial crowdsourcing[J].Journal of Computer Science and Technology,2017,32(5):905-918.
[25] MINAT K,CHENG H T,et al.Performance of broadcast transmission from multiple vehicles in vehicle-roadside vehicle relay network[C]//Proceedings of International lcst Conference on Communications and Networking in China,2011:675-679.
[26] LAI C Z,ZHANG K,CHENG N,et al.SIRC:A secure incentive scheme for reliable cooperative downloading in highway VANETs[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(6):1559-1574.
[27] WANG X J,NING Z L,ZHOU M C,et al.Privacy-preserving content dissemination for vehicular social networks:Challenges and solutions[J].IEEE Communications Surveys and Tutorials,2019,21(2):1314-1345.
[28] GAO Z G,CHEN D J,CAI S B,et al.OptDynLim:An optimal algorithm for the one-dimensional RSU deployment problem with nonuniform profit density[J].IEEE Transactions on Industrial Informatics,2019,15(2):1052-1061.
[29] XIA Y J,CHEN W Z,LIU X J,et al.Adaptive multimedia data forwarding for privacy preservation invehicular adhoc networks[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(10):2629-2641.
[30] NI J B,LIN X D,SHEN X M.Privacy-preserving data forwarding in VANETs:A personal-social behaviorbased approach[C]//Proceeings of GLOBECOM 2017 IEEE Globals Communications Conference,2017.
[31] YEH L Y,LIN Y C.A proxy-based authentication andbilling scheme with incentive-aware multihop forwarding for vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2014,15(4):1607-1621.
[32] LIU J W,LI Q Q,SUN R,et al.An efficient anonymous authentication scheme for internet of vehicles[C]//Proceeings of 2018 IEEE International Conference on Communications(ICC),2018:1-6.
[33] TSO R,HUANG X Y,SUSILO W.Strongly secure certificateless short signatures[J].Journal of Systems & Software,2012,85(6):1409-1417.
[34] HE D B,HUANG B J,CHEN J H,et al.New certificateless short signature scheme[J].LET Information Security,2013,7(2):113-117.